Preferred Language
Articles
/
NBh5hZgBVTCNdQwCB74T
Improving Barcode Vision Scanning Process using a Drone-based Tracking PID Controller for Warehouse in Industry 4.0
...Show More Authors

Drones play a vital role in the fundamental aspects of Industry 4.0 by converting conventional warehouses into intelligent ones, particularly in the realm of barcode scanning. Various potential issues frequently arise during barcode scanning by drones, specifically when the drone camera has difficulty obtaining distinct images due to certain factors, such as distance, capturing the image whilst flying, noise in the environment and different barcode dimensions. In addressing these challenges, this study proposes an approach that combines a proportional–integral–derivative (PID) controller with image processing techniques. The PID controller is responsible for continuously monitoring the camera’s input, detecting the difference between the planned and the real barcode image dimensions, and making immediate changes to the drone position to improve the process of detecting the potential barcode. The aforementioned procedure is implemented on the DJI Tello drone to verify the practical performance of the methodology introduced in this study. Results showed that drones can achieve remarkable barcode scanning performance by incorporating sophisticated computer vision technologies into PID controllers. PID computer vision algorithms are capable of analysing visual data acquired from the drone’s cameras and retrieving barcode information under a variety of situations, such as the size of the barcode, location of the barcode and noise of the warehouse environment.

Scopus Crossref
View Publication
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Performance Evaluation of a Combined Electrocoagulation– Electrooxidation Process for the Treatment of Petroleum Refinery Wastewater
...Show More Authors
Abstract<p>The present study investigates the application of a combined electrocoagulation-electrooxidation (EC-EO) process for the treatment of wastewater generated from Al-Dewaniya petroleum refinery plant in Iraq. The EC-EO process was examined in terms of its ability to simultaneously produce coagulant and oxidant agents by using a parallel plate configuration system composed of stainless steel plates as cathode and pair of aluminum and graphite plates as anode at two different current concentrations (1.92A/l and 0.96A/l). The results showed that the best conditions for treatment of Al-Dewaniya petroleum refinery wastewater using the combined approach were current concentration of (0.96A/l), current density</p> ... Show More
View Publication
Crossref (10)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
ADJUSTING OFF – CENTERING PROCESS FOR A BLOW MOLDED PLASTIC PRODUCT BY USE OF WINQSB SOFTWARE
...Show More Authors

In most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2011
Journal Name
Journal Of Engineering
Membranes separation process for oily wastewater treatment
...Show More Authors

Pilot-scale dead end microfiltration membranes were carried out to determine the feasibility of the process for treating the oily wastewater which discharge from some Iraqi factories such as power station of south of Baghdad and the general company of petrochemical industries. Polypropylene membranes (cylindrical shape) with different pore diameters (1 and 5 micron) were used to conduct the study on micromembrane process. The variables studied are oil concentration (100 – 1000 ppm), feed flow rate (20 – 40 l/h), operating temperature (31 – 50°C) and time (0 – 3 h). It was found that the flux increases with increasing feed flow rate, temperature and pore size of membrane, and decreases with increasing oil concentration and operating

... Show More
Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials &amp; Continua
Industrial Recycling Process of Batteries for EVs
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Applied Sciences
Multiobjective Optimization of Stereolithography for Dental Bridge Based on a Simple Shape Model Using Taguchi and Response Surface Methods
...Show More Authors

Stereolithography (SLA) has become an essential photocuring 3D printing process for producing parts of complex shapes from photosensitive resin exposed to UV light. The selection of the best printing parameters for good accuracy and surface quality can be further complicated by the geometric complexity of the models. This work introduces multiobjective optimization of SLA printing of 3D dental bridges based on simple CAD objects. The effect of the best combination of a low-cost resin 3D printer’s machine parameter settings, namely normal exposure time, bottom exposure time and bottom layers for less dimensional deviation and surface roughness, was studied. A multiobjective optimization method was utilized, combining the Taguchi me

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref